Creating a basic bash script

Creating a basic bash script

I'll show you how to create your first Bash script to perform a small fuzzing operation with the goal of gaining access and then escalating privileges on the "Observer" machine from hackmyvm.

This script is basic but functional, and it can serve as a foundation for creating other types of tools, such as brute-forcing a login panel, different types of fuzzing, scans, and more.

🔗 Watch the video here: Link to Video


#Cybersecurity #hackmyvm #infosec #informationsecurity #ethicalhacking #security

To view or add a comment, sign in

More articles by Kevin Vanegas

  • LittlePivoting-Dockerlabs Walkthrough / WriteUp

    Hello everyone, we continue exploring the Dockerlabs DockerLabs platform that I introduced in my previous video! This…

    5 Comments
  • AS-REP roasting with Crackmapexec/NetExec

    This new Crackmapexec/NetExec series is a part of the Active Directory Lab series on my channel . With tools like…

  • Vulnerable Active Directory Lab

    I'm currently learning pentesting techniques for Active Directory, and I've been sharing my progress on YouTube. Today,…

  • Enumeration With BloodHound

    As a cybersecurity student, I'm constantly seeking ways to expand my knowledge and skill set. Recently, I delved into…

  • Learning About DCSync Attacks in Active Directory

    I continued diving into exploitation techniques within Active Directory. Here are the key highlights: 1️⃣ DCSync…

  • Set Up and Test ASREProast and Kerberoasting Attacks

    We create a small Active Directory lab using VirtualBox and a Windows Server Standard evaluation. We'll configure it to…

  • My notes on solving 'Return' from Hack The Box.

    > The machine Key Concepts: Windows Remote Management (WinRM), SMB (Server Message Block), Enumeration, Printer Admin…

  • Linux `find` Command

    ███████████████████████████████ ███ Linux `find` Command ███…

  • Cross-site WebSocket hijacking (CSWSH) | RC4 encryption

    🔐 Cybersecurity Journey Update: Inkplot Challenge Completed on HackMyVM! 🔗 Watch the video here: Link to Video I took…

  • Dominating 3 Buffer Overflows on a Single Machine

    During my journey, I encountered a host of vulnerabilities, including local file inclusion, log poisoning, and the…

Insights from the community

Others also viewed

Explore topics